메뉴 건너뛰기




Volumn 154, Issue 2, 2006, Pages 189-201

List signature schemes

Author keywords

Electronic voting schemes; Group signature schemes; List signature schemes

Indexed keywords

MANAGERS; PROBLEM SOLVING;

EID: 29244444524     PISSN: 0166218X     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.dam.2005.08.003     Document Type: Conference Paper
Times cited : (24)

References (29)
  • 1
    • 84937431456 scopus 로고    scopus 로고
    • Efficient computation modulo a shared secret with application to the generation of shared safe-prime products
    • M. Yung (Ed.), Advances in Cryptography - Crypto'02 Springer, Berlin
    • J. Algesheimer, J. Camenisch, V. Shoup, Efficient computation modulo a shared secret with application to the generation of shared safe-prime products, in: M. Yung (Ed.), Advances in Cryptography - Crypto'02, Lecture Notes in Computer Science, vol. 2442, Springer, Berlin, 2002, pp. 417-432.
    • (2002) Lecture Notes in Computer Science , vol.2442 , pp. 417-432
    • Algesheimer, J.1    Camenisch, J.2    Shoup, V.3
  • 2
    • 84921018856 scopus 로고    scopus 로고
    • A practical and provably secure coalition-resistant group signature scheme
    • M. Bellare (Ed.), Advances in Cryptography - Crypto'00 Springer, Berlin
    • G. Ateniese, J. Camenisch, M. Joye, G. Tsudik, A practical and provably secure coalition-resistant group signature scheme, in: M. Bellare (Ed.), Advances in Cryptography - Crypto'00, Lecture Notes in Computer Science, vol. 1880, Springer, Berlin, 2000, pp. 11-15.
    • (2000) Lecture Notes in Computer Science , vol.1880 , pp. 11-15
    • Ateniese, G.1    Camenisch, J.2    Joye, M.3    Tsudik, G.4
  • 3
    • 84957043547 scopus 로고    scopus 로고
    • Quasi-efficient revocation of group signatures
    • M. Blaze (Ed.), FC'02 Springer, Berlin
    • G. Ateniese, D. Song, G. Tsudik, Quasi-efficient revocation of group signatures, in: M. Blaze (Ed.), FC'02, Lecture Notes in Computer Science, vol. 2357, Springer, Berlin, 2003, pp. 183-197.
    • (2003) Lecture Notes in Computer Science , vol.2357 , pp. 183-197
    • Ateniese, G.1    Song, D.2    Tsudik, G.3
  • 4
    • 84957360970 scopus 로고    scopus 로고
    • Collision-free accumulators and fail-stop signature schemes without trees
    • W. Fumy (Ed.), Advances in Cryptography - Eurocrypt'97 Springer, Berlin
    • N. Barić, B. Pfitzmann, Collision-free accumulators and fail-stop signature schemes without trees, in: W. Fumy (Ed.), Advances in Cryptography - Eurocrypt'97, Lecture Notes in Computer Science, vol. 1233, Springer, Berlin, 1997, pp. 480-484.
    • (1997) Lecture Notes in Computer Science , vol.1233 , pp. 480-484
    • Barić, N.1    Pfitzmann, B.2
  • 5
    • 35248843604 scopus 로고    scopus 로고
    • Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions
    • E. Biham (Ed.), Advances in Cryptography - Eurocrypt'03 Springer, Berlin
    • M. Bellare, D. Micciancio, B. Warinschi, Foundations of group signatures: formal definitions, simplified requirements, and a construction based on general assumptions, in: E. Biham (Ed.), Advances in Cryptography - Eurocrypt'03, Lecture Notes in Computer Science, vol. 2656, Springer, Berlin, 2003, pp. 614-629.
    • (2003) Lecture Notes in Computer Science , vol.2656 , pp. 614-629
    • Bellare, M.1    Micciancio, D.2    Warinschi, B.3
  • 6
    • 37849017252 scopus 로고    scopus 로고
    • Foundations of group signatures: The case of dynamic groups
    • IACR's ePrint Archive
    • M. Bellare, H. Shi, C. Zhang, Foundations of group signatures: the case of dynamic groups, Technical Report 77, IACR's ePrint Archive, 2004.
    • (2004) Technical Report , vol.77
    • Bellare, M.1    Shi, H.2    Zhang, C.3
  • 7
    • 29244443286 scopus 로고    scopus 로고
    • On the soundness of Girault's scheme
    • Poster paper Rump Session
    • F. Boudot, On the soundness of Girault's scheme, Poster paper of Eurocrypt 2000, Rump Session, 2000.
    • (2000) Eurocrypt 2000
    • Boudot, F.1
  • 8
    • 84958664495 scopus 로고    scopus 로고
    • Efficient publicly verifiable secret sharing schemes with fast or delayed recovery
    • V. Varadharajan, Y. Mu (Eds.), ICICS'99 Springer, Berlin
    • F. Boudot, J. Traoré, Efficient publicly verifiable secret sharing schemes with fast or delayed recovery, in: V. Varadharajan, Y. Mu (Eds.), ICICS'99, Lecture Notes in Computer Science, vol. 1726, Springer, Berlin, 1999, pp. 87-102.
    • (1999) Lecture Notes in Computer Science , vol.1726 , pp. 87-102
    • Boudot, F.1    Traoré, J.2
  • 9
    • 84937429196 scopus 로고    scopus 로고
    • Efficient revocation in group signatures
    • K. Kim (Ed.), PKC'01 Springer, Berlin
    • E. Bresson, J. Stern, Efficient revocation in group signatures, in: K. Kim (Ed.), PKC'01, Lecture Notes in Computer Science, vol. 1992, Springer, Berlin, 2001, pp. 190-206.
    • (2001) Lecture Notes in Computer Science , vol.1992 , pp. 190-206
    • Bresson, E.1    Stern, J.2
  • 11
    • 84957354154 scopus 로고    scopus 로고
    • Efficient and generalized group signatures
    • W. Fumy (Ed.), Advances in Cryptography - Eurocrypt'97 Springer, Berlin
    • J. Camenisch, Efficient and generalized group signatures, in: W. Fumy (Ed.), Advances in Cryptography - Eurocrypt'97, Lecture Notes in Computer Science, vol. 1233, Springer, Berlin, 1997, pp. 465-479.
    • (1997) Lecture Notes in Computer Science , vol.1233 , pp. 465-479
    • Camenisch, J.1
  • 13
    • 29244475923 scopus 로고    scopus 로고
    • Private communication
    • J. Camenisch, Private communication, 2000.
    • (2000)
    • Camenisch, J.1
  • 15
    • 84937428748 scopus 로고    scopus 로고
    • Dynamic accumulators and application to efficient revocation of anonymous credentials
    • M. Yung (Ed.), Advances in Cryptography - Crypto'02 Springer, Berlin
    • J. Camenisch, A. Lysyanskaya, Dynamic accumulators and application to efficient revocation of anonymous credentials, in: M. Yung (Ed.), Advances in Cryptography - Crypto'02, Lecture Notes in Computer Science, vol. 2442, Springer, Berlin, 2002, pp. 93-118.
    • (2002) Lecture Notes in Computer Science , vol.2442 , pp. 93-118
    • Camenisch, J.1    Lysyanskaya, A.2
  • 16
    • 63449102764 scopus 로고    scopus 로고
    • On fair e-cash systems based on group signature schemes
    • R. Safavi-Naini, J. Seberry (Eds.), ACISP'03 Springer, Berlin
    • S. Canard, J. Traoré, On fair e-cash systems based on group signature schemes, in: R. Safavi-Naini, J. Seberry (Eds.), ACISP'03, Lecture Notes in Computer Science, vol. 2727, Springer, Berlin, 2003, pp. 237-248.
    • (2003) Lecture Notes in Computer Science , vol.2727 , pp. 237-248
    • Canard, S.1    Traoré, J.2
  • 17
    • 85001025766 scopus 로고
    • Wallet databases with observers
    • E. Brickell (Ed.), Advances in Cryptography - Crypto'92 Springer, Berlin
    • D. Chaum, T. Pedersen, Wallet databases with observers, in: E. Brickell (Ed.), Advances in Cryptography - Crypto'92, Lecture Notes in Computer Science, vol. 740, Springer, Berlin, 1993, pp. 89-105.
    • (1993) Lecture Notes in Computer Science , vol.740 , pp. 89-105
    • Chaum, D.1    Pedersen, T.2
  • 18
    • 85024290278 scopus 로고
    • Group signatures
    • D.W. Davies (Ed.), Advances in Cryptography - Eurocrypt'91 Springer, Berlin
    • D. Chaum, E. van Heyst, Group signatures, in: D.W. Davies (Ed.), Advances in Cryptography - Eurocrypt'91, Lecture Notes in Computer Science, vol. 547, Springer, Berlin, 1991, pp. 257-265.
    • (1991) Lecture Notes in Computer Science , vol.547 , pp. 257-265
    • Chaum, D.1    Van Heyst, E.2
  • 19
    • 85016672373 scopus 로고
    • Proofs of partial knowledge and simplified design of witness hiding protocols
    • Y. Desmedt (Ed.), Advances in Cryptography - Crypto'94 Springer, Berlin
    • R. Cramer, I. Damgård, B. Schoenmakers, Proofs of partial knowledge and simplified design of witness hiding protocols, in: Y. Desmedt (Ed.), Advances in Cryptography - Crypto'94, Lecture Notes in Computer Science, vol. 839, Springer, Berlin, 1994, pp. 174-187.
    • (1994) Lecture Notes in Computer Science , vol.839 , pp. 174-187
    • Cramer, R.1    Damgård, I.2    Schoenmakers, B.3
  • 20
    • 84957375076 scopus 로고    scopus 로고
    • A secure and optimally efficient multi-authority election scheme
    • W. Fumy (Ed.), Advances in Cryptography - Eurocrypt'97 Springer, Berlin
    • R. Cramer, R. Gennaro, B. Schoenmakers, A secure and optimally efficient multi-authority election scheme, in: W. Fumy (Ed.), Advances in Cryptography - Eurocrypt'97, Lecture Notes in Computer Science, vol. 1233, Springer, Berlin, 1997, pp. 103-118.
    • (1997) Lecture Notes in Computer Science , vol.1233 , pp. 103-118
    • Cramer, R.1    Gennaro, R.2    Schoenmakers, B.3
  • 21
    • 35048854233 scopus 로고    scopus 로고
    • Anonymous identification in ad hoc groups
    • C. Cachin, J. Camenisch (Eds.), Advances in Cryptography - Eurocrypt'04 Springer, Berlin
    • Y. Dodis, A. Kiayias, A. Nicolosi, V. Shoup, Anonymous identification in ad hoc groups, in: C. Cachin, J. Camenisch (Eds.), Advances in Cryptography - Eurocrypt'04, Lecture Notes in Computer Science, vol. 3027, Springer, Berlin, 2004, pp. 609-626.
    • (2004) Lecture Notes in Computer Science , vol.3027 , pp. 609-626
    • Dodis, Y.1    Kiayias, A.2    Nicolosi, A.3    Shoup, V.4
  • 22
    • 35048841283 scopus 로고    scopus 로고
    • Traceable signatures
    • C. Cachin, J. Camenisch (Eds.), Advances in Cryptography - Eurocrypt'04 Springer, Berlin
    • A. Kiayias, Y. Tsiounis, M. Yung, Traceable signatures, in: C. Cachin, J. Camenisch (Eds.), Advances in Cryptography - Eurocrypt'04, Lecture Notes in Computer Science, vol. 3027, Springer, Berlin, 2004, pp. 571-589.
    • (2004) Lecture Notes in Computer Science , vol.3027 , pp. 571-589
    • Kiayias, A.1    Tsiounis, Y.2    Yung, M.3
  • 23
    • 29244453439 scopus 로고    scopus 로고
    • Group signatures: Provable security, efficient constructions and anonymity from trapdoor holders
    • IACR's ePrint Archive
    • A. Kiayias, M. Yung, Group signatures: provable security, efficient constructions and anonymity from trapdoor holders, Technical Report 76, IACR's ePrint Archive, 2004.
    • (2004) Technical Report , vol.76
    • Kiayias, A.1    Yung, M.2
  • 24
    • 84959043878 scopus 로고    scopus 로고
    • Efficient and secure member deletion in group signature schemes
    • D. Won (Ed.), ICISC'00 Springer, Berlin
    • H. Kim, J. Lim, D. Lee, Efficient and secure member deletion in group signature schemes, in: D. Won (Ed.), ICISC'00, Lecture Notes in Computer Science, vol. 2015, Springer, Berlin, 2000, pp. 150-161.
    • (2000) Lecture Notes in Computer Science , vol.2015 , pp. 150-161
    • Kim, H.1    Lim, J.2    Lee, D.3
  • 25
    • 84946820591 scopus 로고    scopus 로고
    • Unbelievable security: Matching AES security using public key systems
    • C. Boyd (Ed.), Advances in Cryptography - Asiacrypt'01 Springer, Berlin
    • A.K. Lenstra, Unbelievable security: matching AES security using public key systems, in: C. Boyd (Ed.), Advances in Cryptography - Asiacrypt'01, Lecture Notes in Computer Science, vol. 2248, Springer, Berlin, 2001, pp. 67-86.
    • (2001) Lecture Notes in Computer Science , vol.2248 , pp. 67-86
    • Lenstra, A.K.1
  • 26
    • 84946833891 scopus 로고    scopus 로고
    • How to leak a secret
    • C. Boyd (Ed.), Advances in Cryptography - Asiacrypt'01 Springer, Berlin
    • R.L. Rivest, A. Shamir, Y. Tauman, How to leak a secret, in: C. Boyd (Ed.), Advances in Cryptography - Asiacrypt'01, Lecture Notes in Computer Science, vol. 2248, Springer, Berlin, 2001, pp. 552-565.
    • (2001) Lecture Notes in Computer Science , vol.2248 , pp. 552-565
    • Rivest, R.L.1    Shamir, A.2    Tauman, Y.3
  • 27
    • 12344258539 scopus 로고
    • Efficient signature generation by smart cards
    • C. Schnorr Efficient signature generation by smart cards J. Cryptol. 4 1991 161 174
    • (1991) J. Cryptol. , vol.4 , pp. 161-174
    • Schnorr, C.1
  • 28
  • 29
    • 84961331891 scopus 로고    scopus 로고
    • Group signatures and their relevance to privacy-protecting off-line electronic cash systems
    • ACISP'99 Springer, Berlin
    • J. Traoré, Group signatures and their relevance to privacy-protecting off-line electronic cash systems, ACISP'99, Lecture Notes in Computer Science, vol. 1587, Springer, Berlin, 1999, pp. 228-243.
    • (1999) Lecture Notes in Computer Science , vol.1587 , pp. 228-243
    • Traoré, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.